Metasploit mailing list archives

Re: msf server behind nat


From: Varga-Perke Balint <vpbalint () gmail com>
Date: Wed, 15 Dec 2010 23:15:21 +0100

Well, I checked the sources and found that the reverse shell handler (lib/msf/core/handler/reverse_tcp.rb) actually registers an option called ReverseListenerBindAddress, that can override the LHOST option. I didn't test this feature, but seems quite simple. Hope this will help someone having problems with NAT.

2010-12-14 15:50 keltezéssel, Matt Gardenghi írta:
/note could be viewed as blog spam as I wrote this piece....

http://www.skullsecurity.org/blog/2009/bypassing-av-over-the-internet-with-metasploit

Matt


On 12/14/2010 9:30 AM, Tod Beardsley wrote:
Hi Balint --

On Tue, Dec 14, 2010 at 7:47 AM, Varga-Perke Balint<vpbalint () gmail com> wrote:
Did I miss some option or should I always run these type of exploits with direct
network connection?
For individual exploits, you can configure LHOST and LPORT, which
generally solves the NAT problem. I've been kicking around getting
MSF3 UPnP-aware, though -- with something like that, you could just
let the framework configure your NAT device for you through UPnP
requests (assuming your router supports it), and it would be dealt
with automatically. This is the strategy used by some BitTorrent
clients.
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: